FSIS CA #3 Test Review

FSIS CA #3 Test Review

8th Grade

14 Qs

quiz-placeholder

Similar activities

CNS-QUIZ1

CNS-QUIZ1

1st Grade - University

10 Qs

Cybersecurity Fundamentals Week 5 Quiz

Cybersecurity Fundamentals Week 5 Quiz

KG - University

10 Qs

Quiz Digital Forensics

Quiz Digital Forensics

1st - 12th Grade

15 Qs

Module 3

Module 3

8th Grade

10 Qs

Java Basic Data Structures

Java Basic Data Structures

6th - 10th Grade

15 Qs

Endpoint Device Quiz

Endpoint Device Quiz

4th - 8th Grade

10 Qs

Unit 6 - Information Security Test Review

Unit 6 - Information Security Test Review

8th Grade

19 Qs

CYBERSECURITY FUNDAMENTALS (CHAPTER 1)

CYBERSECURITY FUNDAMENTALS (CHAPTER 1)

6th - 8th Grade

15 Qs

FSIS CA #3 Test Review

FSIS CA #3 Test Review

Assessment

Quiz

Computers

8th Grade

Hard

Created by

Kenneth Hood

Used 3+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1)      Which of the following terms refers to an attack using commonly known passwords in a password field?

     Brute force attack

Dictionary attack

     Ransomware attack

viral attackTest

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1)      Which of the following responses explains the CIA triad?

Confidentiality, Integrity, & Availability

Central Intelligence Agency

Confidentiality, Integrity, & Authentication

Confidentiality, Integrity, & Accountability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following responses explains the CIA triad?

Confidentiality, Integrity, & Availability

Central Intelligence Agency

Confidentiality, Integrity, & Authentication

Confidentiality, Integrity, & Accountability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are 3 qualities of strong passwords?

Length, accessibility, & uniqueness

Length, complexity, & uniqueness

Accessibility, complexity, & uniqueness

Length, complexity, & authorization

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a component of Access Control?

Identification

Authentication

Authorization

Confidentiality

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is Step 1 in Risk Assessment?

Identify the Asset Owners

Identify the Risk Owners

Identify the Information Assets

Determine the Levels of Risk

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following refers to an attacker trying all possible combinations of characters in a password field?

Rainbow tables

Brute Force attack

Dictionary attack

Hash

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?